REPLY 1 Question A What are three common encryption ciphers

  

REPLY 1

Question A

What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?

Question B

How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                  CLASSMATE’S DISCUSSION

Question A

The three common encryption ciphers used to protect network communications are monoalphabetic, polyalphabetic, and transposition cipher. A monoalphabetic substitution-based cipher replaces a character or group of characters with a different character or group of characters, (White, 2016). This type of cipher is simple. However, there is a disadvantage of the frequency of the substituting. The polyalphabetic substitution-based cipher is similar to the mono alphabetic cipher, but it uses multiple alphabetic strings to encode the plaintext, rather than one alphabetic string, (White, 2016). This type of cipher is better because it prevents a frequency analysis or algorithms from decoding easily. A transposition-based cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved, (White, 2016). With the transposition cipher the character is moved but not changed.

Reference:

White, C. (2016). Data Communications and Computer Networks: A Business User’s Approach

(Independence, KY: Cengage Learnings ISBN: 9781305729902 8th ed.). 

Question B

Data encrypted with the public key can be decoded only with the public key, and data encrypted with the private key can be decoded only with the public key, (White, C. 2016). Public key cryptography provides protection to network data when one person or organization has either a key to code or decode. One end will have the public key that encrypts, and the other private key will decode the ciphertext.

Reply 2

Question A

What are three common encryption ciphers used to protect network communications, and what are the capabilities that they offer?

Question B

How does public key cryptography provide protection for network data? What are the major elements that enable it to provide this capability?

REFLECT AND REPLY TO CLASSMATE DISCUSSION TO BOTH OF THE ABOVE QUESTIONS EXPLAINING WHY YOU AGREE (MINIMUM OF 125 WORDS)

                                                   CLASSMATE’S DISCUSSION

Question A

Question A – Triple DES, AES ad RSA are the most common encryption ciphers.

Triple DES was a recommended encryption standard and at one point, used to be one of the most used symmetric algorithm in the industry. Triple DES uses three keys that are 56 bits each. Although total key length is supposed to be 168 bits, some argue they are 112 bits in strength. 

AES is the algorithm standard used by the US government and a good number of companies and organizations. AES comes in 128, 192, and 256 ciphers. AES is one of the most resilient encryption ciphers in the market today.

RSA is a public key encryption algorithm and the standard encryption for data sent over the internet. Those familiar with PGP will know that RSA is one of the encryption methods used in the program. This encryption algorithm is asymmetric, requiring a public key to encrypt the message and a private key to decrypt it.

Question B

Public cryptography works on the principle of using two keys, a public key and a private key to protect the data. The user of the technology receives a public/private key pair from a certified authority. When data is sent to other users, they have access to the public key from the sender, which has been used to encrypt the data. When the message arrives at its destination, the recipient can then use its private key to decrypt the message.

The major elements that support this system are the public/private key pairs, the certifying authority and the principle of public keys, which eliminates the need for users to exchange their private keys. 

Reference:

– Lord, N. (2018). A definition of public cryptography. Retrieved Jun 22, 2022 from  https://digitalguardian.com/blog/what-public-key-cryptography

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

A variety of models for making decisions are available. Three

A variety of models for making decisions are available. Three of these models are paternalistic, informative, and shared decision making. Discuss the pros and cons of each of these models and the problems that are best suited for the various methods. Determine which method has the strongest possibility of resulting

Project: Develop and design an effective global mobility program highlighting

Project: Develop and design an effective global mobility program highlighting international assignments, adjustment to foreign cultures, work role factors, expatriation-repatriation cycle, and support practices of a particular country  This graduate research paper will be divided into two parts. 1. Answer the questions below  in APA format:  Introduction including Hypothesis Statement

Read quickly through the case (in the attachments) one time

Read quickly through the case (in the attachments) one time to get an overall sense of the material. Read through the case again, carefully. Make written notes as you read. Evaluate how strategic concepts might inform key decisions or suggest alternative solutions After formulating an initial recommendation, evaluate the case

ata Analysis View the videos “Reverse Scored Items and Subscales”

  ata Analysis View the videos “Reverse Scored Items and Subscales” and “Subscale Scoring” for examples of how to compute reverse-scored items and subscales. Complete all of the steps necessary to prepare your data for analysis.  Make sure each of the following steps has been completed: 1  All reverse-scored items

Planning is the key to successful completion of this course Nursing Assignment Help

Planning is the key to successful completion of this course and program-related objectives. The Individual Success Plan (ISP) assignment requires early collaboration with the course faculty and your course preceptor. Students must establish a plan for successful completion of The required 50 community direct clinical practice experience hours, 50 leadership

Quality and Safety in Practice

This assignment is designed to highlight the role you play in quality, safe patient care on a daily basis. Identify a patient care case from your own practice experience that involves quality and safety. Note: If you are not practicing or have nor practice, use a case that has received

Stories told through news media and documentary films continually illustrate

 Stories told through news media and documentary films continually illustrate the inequities in the criminal justice system. In general, these inequities fall along race and class lines. Considering the multiple components of the system (i.e., law enforcement, the courts, and prisons), where are the greatest injustices found? And what should

The textbook explains how the PESTEL Analysis helps identify and

The textbook explains how the PESTEL Analysis helps identify and analyze societal level trends. Understanding trends in the external environment are crucial to developing successful strategies and preparing for long term productivity. Select one of the businesses listed below and complete the PESTEL Analysis for that specific business. You will

QUESTIONS Pick one topic from this week’s MEDíA Write your

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

For this work, you will choose a global health issue

For this work, you will choose a global health issue topic (Diabetes Mellitus Type 2). The work will be 2 to 3 pages (excluding the title page and reference page) and written in APA format. A minimum of six (6) current references (within the last five years) should be cited

Outdoor footwear market value is estimated to register US$ 82.62

  Outdoor footwear market value is estimated to register US$ 82.62 Bn in by 2032-end. Meanwhile, utilization of outdoor footwear is expected to increase at a CAGR of around 7.1% over the upcoming years. COVID-19 forced countries across the world to go into lockdowns. Moreover, the outdoor footwear industry persisted immune

Belhaven University Personal Philosophy of Nursing Discussion Nursing Assignment Help

What is your personal philosophy of nursing?  Expert Solution Preview Introduction: As a medical professor responsible for creating college assignments and evaluating student performance, my personal philosophy of nursing is centered around the belief that healthcare should be patient-centered, holistic, evidence-based, and collaborative. I firmly believe that nurses have a

As policymakers and healthcare managers consider various ways to contain

 As policymakers and healthcare managers consider various ways to contain the rising costs of health care, it is useful to examine the patterns and elements of health care costs that are needed to run the United States delivery system. Explain the difference between fixed and variable costs in healthcare. Give

Applying Decision Making Models in Health

 Description This is a benchmark assignment. Apply Nash’s 12 Questions for Moral Choices model to the following ethical dilemma: Your terminally ill patient told you at her last visit that, since her pain could no longer be completely controlled by any means, and in her opinion she was just waiting

A List 5 possible names. Please review the related information

  A List 5 possible names. Please review the related information in the student manual about name choice. What is the current location of the store?  What options do you have for relocating? Where is the cash for the acquisition of the store coming from? What will you have to

Introduction, Thesis Statement, and Annotated Bibliography [WLOs: 1, 2, 3,

Introduction, Thesis Statement, and Annotated Bibliography [WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 2, 3, 4, 5] Prepare: Prior to beginning work on this assignment, review the Introductions & Conclusions (Links to an external site.) and Annotated Bibliography (Links to an external site.) web pages, and Evaluating Sources (Links to an external